- How do I use syscall to perform sys_fork() or sys_mmap()? https://blog.rchapman.org/posts/Linux_System_Call_Table_for_x86_64/ 2 comments assembly_language
- Need some help with calling asm from C http://blog.rchapman.org/posts/Linux_System_Call_Table_for_x86_64/ 6 comments asm
Linking pages
- GitHub - gcmartinelli/assembly-playground: Random code snippets used to learn x86_64 assembly language https://github.com/gcmartinelli/assembly-playground 31 comments
- Hello "Hello world!" https://blog.jfo.click/hello-hello-world/ 16 comments
- A curated list of Assembly Language / Reversing / Malware Analysis / Game Hacking-resources · GitHub https://gist.github.com/muff-in/ff678b1fda17e6188aa0462a99626121 5 comments
- Reverse Engineering Challenge | Lucky Numbers | Medium https://jaybailey216.medium.com/reverse-engineering-challenge-lucky-numbers-84e342fd588b?sk=3d8a1338717a2a6f89e3e3c376360d44 2 comments
- GitHub - barrettotte/perceptron-asm: A single-layer perceptron in x86 assembly to distinguish between circles and rectangles. https://github.com/barrettotte/perceptron-asm 0 comments
- Writing a Password Protected Reverse Shell (Linux/x64) | by Syscall59 — Alan Vivona | syscall59 | Medium https://medium.com/@0x0FFB347/writing-a-password-protected-reverse-shell-linux-x64-5f4d3a28d91a 0 comments
Linked pages
Related searches:
Search whole site: site:blog.rchapman.org
Search title: Linux System Call Table for x86 64 · Ryan A. Chapman
See how to search.